Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-43497

Опубликовано: 20 сент. 2023
Источник: redhat
CVSS3: 3.6
EPSS Низкий

Описание

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

A flaw was found in Jenkins weekly and LTS due to an issue when processing file uploads using the Stapler web framework. By sending a specially crafted request, a local authenticated attacker could bypass security restrictions and access the Jenkins controller file system to read and write the files before they are used.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and ServicesjenkinsAffected
Red Hat OpenShift Container Platform 3.11jenkinsOut of support scope
Red Hat OpenShift Container Platform 4jenkinsAffected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-378
https://bugzilla.redhat.com/show_bug.cgi?id=2240095jenkins: Stapler web framework temporary uploaded file created with insecure permissions

EPSS

Процентиль: 21%
0.00066
Низкий

3.6 Low

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
почти 2 года назад

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

CVSS3: 8.1
debian
почти 2 года назад

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file ...

CVSS3: 3.6
github
почти 2 года назад

Jenkins temporary uploaded file created with insecure permissions

CVSS3: 8.1
fstec
почти 2 года назад

Уязвимость сервера автоматизации Jenkins, связанная с неограниченной загрузкой файла опасного типа, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов

CVSS3: 8.8
redos
около 1 года назад

Множественные уязвимости jenkins

EPSS

Процентиль: 21%
0.00066
Низкий

3.6 Low

CVSS3

Уязвимость CVE-2023-43497